CCFH-202 CrowdStrike Certified Falcon Hunter Dumps

Page 1

Exam:CCFH-202

Title:

https://www.passcert.com/CCFH-202.html

1/5
DownloadthelatestCrowdStrikeCCFH-202examdumpstoensureyoursuccess
CrowdStrikeCertified FalconHunter

1.Whichofthefollowingisasuspiciousprocessbehavior?

APowerShellrunninganexecutionpolicyofRemoteSigned

B.AnInternetbrowser(eg,InternetExplorer)performingmultipleDNSrequests

CPowerShelllaunchingaPowerShellscript

DNon-networkprocesses(eg,notepadexe)makinganoutboundnetworkconnection

Answer:D

Explanation:

Non-networkprocessesareprocessesthatarenotexpectedtocommunicateoverthenetwork,suchas notepadexeIftheymakeanoutboundnetworkconnection,itcouldindicatethattheyarecompromised ormaliciouslyusedbyanadversaryPowerShellrunninganexecutionpolicyofRemoteSignedisa defaultsettingthatallowslocalscriptstorunwithoutdigitalsignaturesAnInternetbrowserperforming multipleDNSrequestsisanormalbehaviorforwebbrowsing.PowerShelllaunchingaPowerShellscript isalsoacommonbehaviorforlegitimatetasks

Reference:

https://wwwcrowdstrikecom/blog/tech-center/detect-malicious-use-of-non-network-processes/

2Whichfieldshouldyoureferenceinordertofindthesystemtimeofa*FileWrittenevent?

A.ContextTimeStampdecimal

BFileTimeStampdecimal

CProcessStartTimedecimal

Dtimestamp

Answer:A

Explanation:

ContextTimeStampdecimalisthefieldthatshowsthesystemtimeoftheeventthattriggeredthesensor tosenddatatothecloudInthiscase,itwouldbethetimewhenthefilewaswritten

FileTimeStampdecimalisthefieldthatshowsthelastmodifiedtimeofthefile,whichmaynotbethe sameasthetimewhenthefilewaswrittenProcessStartTimedecimalisthefieldthatshowsthestart timeoftheprocessthatperformedthefilewriteoperation,whichmaynotbethesameasthetimewhen thefilewaswritten.Timestampisthefieldthatshowsthetimewhenthesensordatawasreceivedbythe cloud,whichmaynotbethesameasthetimewhenthefilewaswritten

Reference:

https://wwwcrowdstrikecom/blog/tech-center/understanding-timestamps-in-crowdstrike-falcon/

3WhatSearchpagewouldhelpathreathunterdifferentiatetesting,DevOPs,orgeneraluseractivity fromadversarybehavior?

AHashSearch

BIPSearch

CDomainSearch

DUserSearch

Answer:D

Explanation:

UserSearchisasearchpagethatallowsathreathuntertosearchforuseractivityacrossendpointsand correlateitwithothereventsThiscanhelpdifferentiatetesting,DevOPs,orgeneraluseractivityfrom adversarybehaviorbyidentifyinganomalousorsuspicioususeractions,suchasloggingintomultiple

DownloadthelatestCrowdStrikeCCFH-202examdumpstoensureyoursuccess 2/5

DownloadthelatestCrowdStrikeCCFH-202examdumpstoensureyoursuccess

systems,runningunusualcommands,oraccessingsensitivefiles.

Reference:https://wwwcrowdstrikecom/blog/tech-center/user-search-in-crowdstrike-falcon/

4AnanalysthassortedallrecentdetectionsintheFalconplatformtoidentifytheoldestinaneffortto determinethepossiblefirstvictimhostWhatisthistypeofanalysiscalled?

AVisualizationofhosts

BStatisticalanalysis

CTemporalanalysis

DMachineLearning

Answer:C

Explanation:

Temporalanalysisisatypeofanalysisthatfocusesonthetimingandsequenceofeventsinorderto identifypatterns,trends,oranomaliesBysortingallrecentdetectionsintheFalconplatformtoidentify theoldest,ananalystcanperformtemporalanalysistodeterminethepossiblefirstvictimhostandtrace backtheoriginofanattack

Reference:https://www.crowdstrike.com/blog/tech-center/temporal-analysis-in-crowdstrike-falcon/ 5.RefertoExhibit.

Falcondetectedtheabovefileattemptingtoexecute.

Atinitialglance;whatindicatorscanweusetoprovideaninitialanalysisofthefile?

A.VirusTotal,HybridAnalysis,andGooglepivotindicatorlightsenabled

BFilename,path,LocalandGlobalprevalencewithintheenvironment

CFilepath,harddiskvolumenumber,andIOCManagementaction

DLocalprevalence,IOCManagementaction,andEventSearch

Answer:B

Explanation:

Thefilename,path,LocalandGlobalprevalenceareindicatorsthatcanprovideaninitialanalysisofthe filewithoutrelyingonexternalsourcesortoolsThefilenamecanindicatethepurposeororiginofthefile, suchasifitisalegitimateapplicationoramaliciouspayloadThefilepathcanindicatewherethefilewas locatedorexecutedfrom,suchasifitwasinatemporaryorsystemdirectoryTheLocalandGlobal

3/5

DownloadthelatestCrowdStrikeCCFH-202examdumpstoensureyoursuccess

prevalencecanindicatehowcommonorrarethefileiswithintheenvironmentoracrossallFalcon customers,whichcanhelpassesstheriskorimpactofthefile

Reference:

https://wwwcrowdstrikecom/blog/tech-center/understanding-file-prevalence-in-crowdstrike-falcon/

6Abenefitofusingathreathuntingframeworkisthatit:

AAutomaticallygeneratesincidentreports

BEliminatesfalsepositives

CProvideshighfidelitythreatactorattribution

DProvidesactionable,repeatablestepstoconductthreathunting

Answer:D

Explanation:

Athreathuntingframeworkisamethodologythatguidesthreathuntersinplanning,executing,and improvingtheirthreathuntingactivities.Abenefitofusingathreathuntingframeworkisthatitprovides actionable,repeatablestepstoconductthreathuntinginaconsistentandefficientmannerAthreat huntingframeworkdoesnotautomaticallygenerateincidentreports,eliminatefalsepositives,orprovide highfidelitythreatactorattribution,asthesearedependentonotherfactorssuchasdatasources,tools, andanalysisskills.

Reference:https://wwwcrowdstrikecom/blog/tech-center/threat-hunting-framework/

7WhichofthefollowingisanexampleofaFalconthreathuntinglead?

AAroutinethreathuntqueryshowingprocessexecutionsofsingleletterfilename(eg,aexe)from temporarydirectories

BSecurityappliancelogsshowingpotentiallybadtraffictoanunknownexternalIPaddress CAhelpdeskticketforauserclickingonalinkinanemailcausingtheirmachinetobecome unresponsiveandhavehighCPUusage

DAnexternalreportdescribingaunique5characterfileextensionforransomwareencryptedfiles

Answer:A

Explanation:

AFalconthreathuntingleadisapieceofinformationthatcanbeusedtoinitiateorguideathreathunting activitywithintheFalconplatform.Aroutinethreathuntqueryshowingprocessexecutionsofsingleletter filename(eg,aexe)fromtemporarydirectoriesisanexampleofaFalconthreathuntinglead,asitcan indicatepotentialmaliciousactivitythatcanbefurtherinvestigatedusingFalcondataandfeatures. Securityappliancelogs,helpdesktickets,andexternalreportsarenotexamplesofFalconthreathunting leads,astheyarenotdirectlyrelatedtotheFalconplatformordata.

Reference:https://wwwcrowdstrikecom/blog/tech-center/threat-hunting-leads-in-crowdstrike-falcon/

8TheFalconDetectionspagewillattempttodecodeEncodedPowerShellCommandlineparameters whenwhichPowerShellCommandlineparameterispresent?

A-Command

B-Hidden

C-e

D-nop

Answer:A

4/5

Explanation:

TheFalconDetectionspagewillattempttodecodeEncodedPowerShellCommandlineparameterswhen the-Commandparameterispresent.The-CommandparameterallowsPowerShelltoexecuteaspecified scriptblockorstringIfthescriptblockorstringisencodedusingBase64orothermethods,theFalcon DetectionspagewilltrytodecodeitandshowtheoriginalcommandThe-Hidden,-e,and-nop parametersarenotrelatedtoencodingordecodingPowerShellcommands

Reference:

https://wwwcrowdstrikecom/blog/tech-center/decoding-powershell-commands-in-crowdstrike-falcon/

9Whichstructuredanalytictechniquecontrastsdifferenthypothesestodeterminewhichisthebest leading(prioritized)hypothesis?

A.Modelhuntingframework

BCompetitiveanalysis

C.Analysisofcompetinghypotheses

DKeyassumptionscheck

Answer:C

Explanation:

Analysisofcompetinghypothesesisastructuredanalytictechniquethatcontrastsdifferenthypothesesto determinewhichisthebestleading(prioritized)hypothesisItinvolveslistingallthepossiblehypotheses, identifyingtheevidenceandassumptionsforeachhypothesis,evaluatingtheconsistencyandreliabilityof theevidenceandassumptions,andratingthelikelihoodofeachhypothesisbasedontheevidenceand assumptions

Reference:https://wwwcrowdstrikecom/blog/tech-center/analysis-of-competing-hypotheses/

10WhichSPL(Splunk)fieldnamecanbeusedtoautomaticallyconvertUnixtimes(Epoch)toUTC readabletimewithintheFlaconEventSearch?

Autctime

Bconvtime

C.time

Dtime

Answer:C

Explanation:

timeistheSPL(Splunk)fieldnamethatcanbeusedtoautomaticallyconvertUnixtimes(Epoch)toUTC readabletimewithintheFalconEventSearchItisadefaultfieldthatshowsthetimestampofeachevent inahuman-readableformat.utctime,convtime,andtimearenotvalidSPLfieldnamesforconverting UnixtimestoUTCreadabletime

Reference:

https://wwwcrowdstrikecom/blog/tech-center/understanding-timestamps-in-crowdstrike-falcon/

5/5
DownloadthelatestCrowdStrikeCCFH-202examdumpstoensureyoursuccess

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.